Skip to content
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector. “UNC3886 had launched a deliberate,… 

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move… 

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

Ravie LakshmananFeb 09, 2026Hacking News / Cybersecurity Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI,… 

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Ravie LakshmananFeb 09, 2026Threat Intelligence / Cyber Espionage The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as… 

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

Cybersecurity researchers have called attention to a “massive campaign” that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The activity, observed around December 25, 2025, and described as “worm-driven,”… 

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

Ravie LakshmananFeb 09, 2026Enterprise Security / Network Security BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in… 

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

OpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of… 

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by… 

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises…